|
Volumn 4, Issue , 2011, Pages
|
Threat Modeling the Cloud Computing, Mobile Device Toting, Consumerized Enterprise - An overview of considerations
|
Author keywords
cloud computing; consumerization; mobile device security; Threat modeling
|
Indexed keywords
COMPUTING POWER;
INFORMATION SYSTEMS;
INFORMATION USE;
POINT CONTACTS;
PRODUCTIVITY;
RISK ASSESSMENT;
CLOUD-COMPUTING;
COMPUTING POWER;
CONSUMERISATION;
END POINT CONTROLS;
INTEGRATED COMPUTING;
JUST-IN-TIME;
MEGATRENDS;
MOBILE DEVICE SECURITY;
PRODUCTIVITY GAIN;
THREAT MODELING;
CLOUD COMPUTING;
|
EID: 85139103856
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: None Document Type: Conference Paper |
Times cited : (22)
|
References (7)
|